User authentication is very important over insecure networks environment, along with confidentiality and integrity, ensures that illegal users can not obtain system’s resources by illegal means.
Among numerous methods for user authentication, the password